BibTeX records: Toshihiro Yamauchi

download as .bib file

@article{DBLP:journals/compsec/AkiyamaSFYSY23,
  author       = {Mitsuaki Akiyama and
                  Shugo Shiraishi and
                  Akifumi Fukumoto and
                  Ryota Yoshimoto and
                  Eitaro Shioji and
                  Toshihiro Yamauchi},
  title        = {Seeing is not always believing: Insights on IoT manufacturing from
                  firmware composition analysis and vendor survey},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103389},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103389},
  doi          = {10.1016/J.COSE.2023.103389},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AkiyamaSFYSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/KuzunoY23,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Protection Mechanism of Kernel Data Using Memory Protection Key},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {106},
  number       = {9},
  pages        = {1326--1338},
  year         = {2023},
  url          = {https://doi.org/10.1587/transinf.2022icp0013},
  doi          = {10.1587/TRANSINF.2022ICP0013},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/KuzunoY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NorimatsuNY23,
  author       = {Takashi Norimatsu and
                  Yuichi Nakamura and
                  Toshihiro Yamauchi},
  title        = {Policy-Based Method for Applying OAuth 2.0-Based Security Profiles},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {106},
  number       = {9},
  pages        = {1364--1379},
  year         = {2023},
  url          = {https://doi.org/10.1587/transinf.2022icp0004},
  doi          = {10.1587/TRANSINF.2022ICP0004},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NorimatsuNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/SatoOYT23,
  author       = {Masaya Sato and
                  Taku Omori and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Memory Analysis Based Estimation of Hook Point by Virtual Machine
                  Monitor},
  journal      = {Int. J. Netw. Comput.},
  volume       = {13},
  number       = {2},
  pages        = {273--286},
  year         = {2023},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/310},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnc/SatoOYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/FujiiKSY23,
  author       = {Shota Fujii and
                  Nobutaka Kawaguchi and
                  Tomohiro Shigemoto and
                  Toshihiro Yamauchi},
  title        = {Extracting and Analyzing Cybersecurity Named Entity and its Relationship
                  with Noncontextual IOCs from Unstructured Text of {CTI} Sources},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {578--590},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.578},
  doi          = {10.2197/IPSJJIP.31.578},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/FujiiKSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KuzunoY23,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {788--801},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.788},
  doi          = {10.2197/IPSJJIP.31.788},
  timestamp    = {Sun, 18 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/KuzunoY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/MikiYK23,
  author       = {Masato Miki and
                  Toshihiro Yamauchi and
                  Satoru Kobayashi},
  title        = {Evaluation of Effectiveness of {MAC} Systems Based on {LSM} for Protecting
                  IoT Devices},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023, Matsue, Japan, November 28 - Dec. 1, 2023},
  pages        = {161--167},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDAR60563.2023.00029},
  doi          = {10.1109/CANDAR60563.2023.00029},
  timestamp    = {Fri, 16 Feb 2024 13:45:14 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/MikiYK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/SatoOYT23,
  author       = {Masaya Sato and
                  Taku Omori and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Supporting Multiple {OS} Types on Estimation of System Call Hook Point
                  by Virtual Machine Monitor},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {267--273},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00051},
  doi          = {10.1109/CANDARW60564.2023.00051},
  timestamp    = {Thu, 22 Feb 2024 20:44:52 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/SatoOYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/ShibaKY23,
  author       = {Kaito Shiba and
                  Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Prevention Method for Stack Buffer Overflow Attack in {TA} Command
                  Calls in {OP-TEE}},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {274--278},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00052},
  doi          = {10.1109/CANDARW60564.2023.00052},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/ShibaKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/VictorKY23,
  author       = {Hervet Victor and
                  Satoru Kobayashi and
                  Toshihiro Yamauchi},
  title        = {Analyzing Post-injection Attacker Activities in IoT Devices: {A} Comprehensive
                  Log Analysis Approach},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {292--297},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00055},
  doi          = {10.1109/CANDARW60564.2023.00055},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/VictorKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Regal-MezinKY23,
  author       = {Colin Regal{-}Mezin and
                  Satoru Kobayashi and
                  Toshihiro Yamauchi},
  editor       = {Gareth Tyson and
                  Matteo Varvello},
  title        = {netroub: Towards an Emulation Platform for Network Trouble Scenarios},
  booktitle    = {Proceedings of the on CoNEXT Student Workshop 2023, CoNEXT-SW 2023,
                  Paris, France, 8 December 2023},
  pages        = {17--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3630202.3630222},
  doi          = {10.1145/3630202.3630222},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/Regal-MezinKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KuzunoY23,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Shujun Li and
                  Mark Manulis and
                  Atsuko Miyaji},
  title        = {{KDRM:} Kernel Data Relocation Mechanism to Mitigate Privilege Escalation
                  Attack},
  booktitle    = {Network and System Security - 17th International Conference, {NSS}
                  2023, Canterbury, UK, August 14-16, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13983},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39828-5\_4},
  doi          = {10.1007/978-3-031-39828-5\_4},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KuzunoY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KuzunoYOHY23,
  author       = {Hiroki Kuzuno and
                  Tomohiko Yano and
                  Kazuki Omo and
                  Jeroen van der Ham and
                  Toshihiro Yamauchi},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Security Risk Indicator for Open Source Software to Measure Software
                  Development Status},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {143--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_12},
  doi          = {10.1007/978-981-99-8024-6\_12},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KuzunoYOHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/Yamauchi22,
  author       = {Toshihiro Yamauchi},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {105-D},
  number       = {12},
  pages        = {1998},
  year         = {2022},
  url          = {https://doi.org/10.1587/transinf.2022paf0001},
  doi          = {10.1587/TRANSINF.2022PAF0001},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/Yamauchi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KuzunoY22,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Prevention of Kernel Memory Corruption Using Kernel Page Restriction
                  Mechanism},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {563--576},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.563},
  doi          = {10.2197/IPSJJIP.30.563},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/KuzunoY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/IchiokaPMNY22,
  author       = {Shuichi Ichioka and
                  Estelle Pouget and
                  Takao Mimura and
                  Jun Nakajima and
                  Toshihiro Yamauchi},
  title        = {Analysis of Android Applications Shared on Twitter Focusing on Accessibility
                  Services},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {601--612},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.601},
  doi          = {10.2197/IPSJJIP.30.601},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/IchiokaPMNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KuzunoY22a,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory
                  Mechanism},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {796--806},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.796},
  doi          = {10.2197/IPSJJIP.30.796},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/KuzunoY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/FujiiYY22,
  author       = {Shota Fujii and
                  Rei Yamagishi and
                  Toshihiro Yamauchi},
  title        = {Survey and Analysis on ATT{\&}CK Mapping Function of Online Sandbox
                  for Understanding and Efficient Using},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {807--821},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.807},
  doi          = {10.2197/IPSJJIP.30.807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/FujiiYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/MoriyamaYST22,
  author       = {Hideaki Moriyama and
                  Toshihiro Yamauchi and
                  Masaya Sato and
                  Hideo Taniguchi},
  title        = {Improvement and Evaluation of a Function for Tracing the Diffusion
                  of Classified Information on {KVM}},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {26--43},
  year         = {2022},
  url          = {https://doi.org/10.22667/JISIS.2022.02.28.026},
  doi          = {10.22667/JISIS.2022.02.28.026},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/MoriyamaYST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/BabaBY22,
  author       = {Takahiro Baba and
                  Kensuke Baba and
                  Toshihiro Yamauchi},
  editor       = {Leonard Barolli and
                  Farookh Hussain and
                  Tomoya Enokido},
  title        = {Malware Classification by Deep Learning Using Characteristics of Hash
                  Functions},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 36th International Conference on Advanced Information Networking
                  and Applications (AINA-2022), Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {450},
  pages        = {480--491},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99587-4\_40},
  doi          = {10.1007/978-3-030-99587-4\_40},
  timestamp    = {Thu, 31 Mar 2022 15:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/BabaBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/SatoOYT22,
  author       = {Masaya Sato and
                  Taku Omori and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Hook Point Estimation for System Call Detection by Virtual Machine
                  Monitor},
  booktitle    = {2022 Tenth International Symposium on Computing and Networking, {CANDAR}
                  2022 - Workshops, Himeji, Japan, November 21-24, 2022},
  pages        = {358--362},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CANDARW57323.2022.00069},
  doi          = {10.1109/CANDARW57323.2022.00069},
  timestamp    = {Thu, 23 Mar 2023 08:30:32 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/SatoOYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/FujiiKKSY22,
  author       = {Shota Fujii and
                  Nobutaka Kawaguchi and
                  Shoya Kojima and
                  Tomoya Suzuki and
                  Toshihiro Yamauchi},
  editor       = {Tokuro Matsuo and
                  Kunihiko Takamatsu and
                  Yuichi Ono},
  title        = {Design and Implementation of System for {URL} Signature Construction
                  and Impact Assessment},
  booktitle    = {12th International Congress on Advanced Applied Informatics, {IIAI-AAI}
                  2022, Kanazawa, Japan, July 2-8, 2022},
  pages        = {95--100},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IIAIAAI55812.2022.00028},
  doi          = {10.1109/IIAIAAI55812.2022.00028},
  timestamp    = {Tue, 04 Oct 2022 17:55:04 +0200},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/FujiiKKSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/SatoNYT22,
  author       = {Masaya Sato and
                  Ryosuke Nakamura and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {Tokuro Matsuo and
                  Kunihiko Takamatsu and
                  Yuichi Ono},
  title        = {Improving Transparency of Hardware Breakpoints with Virtual Machine
                  Introspection},
  booktitle    = {12th International Congress on Advanced Applied Informatics, {IIAI-AAI}
                  2022, Kanazawa, Japan, July 2-8, 2022},
  pages        = {113--117},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IIAIAAI55812.2022.00031},
  doi          = {10.1109/IIAIAAI55812.2022.00031},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/SatoNYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuzunoY22,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {{KDPM:} Kernel Data Protection Mechanism Using a Memory Protection
                  Key},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {66--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_4},
  doi          = {10.1007/978-3-031-15255-9\_4},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuzunoY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FujiiKSY22,
  author       = {Shota Fujii and
                  Nobutaka Kawaguchi and
                  Tomohiro Shigemoto and
                  Toshihiro Yamauchi},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {CyNER: Information Extraction from Unstructured Text of {CTI} Sources
                  with Noncontextual IOCs},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {85--104},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_5},
  doi          = {10.1007/978-3-031-15255-9\_5},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FujiiKSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/NorimatsuNY22,
  author       = {Takashi Norimatsu and
                  Yuichi Nakamura and
                  Toshihiro Yamauchi},
  editor       = {Heiko Ro{\ss}nagel and
                  Christian H. Schunck and
                  Sebastian M{\"{o}}dersheim},
  title        = {Flexible Method for Supporting OAuth 2.0 Based Security Profiles in
                  Keycloak},
  booktitle    = {Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022},
  series       = {{LNI}},
  volume       = {{P-325}},
  pages        = {87--98},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/OID2022\_07},
  doi          = {10.18420/OID2022\_07},
  timestamp    = {Tue, 04 Jul 2023 17:42:04 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/NorimatsuNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KuzunoY22,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel
                  Vulnerability},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {222--234},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_16},
  doi          = {10.1007/978-3-031-25659-2\_16},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KuzunoY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KuzunoY21,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory
                  Mechanism},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {111651--111665},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3101452},
  doi          = {10.1109/ACCESS.2021.3101452},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KuzunoY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YamauchiAYNH21,
  author       = {Toshihiro Yamauchi and
                  Yohei Akao and
                  Ryota Yoshitani and
                  Yuichi Nakamura and
                  Masaki Hashimoto},
  title        = {Additional kernel observer: privilege escalation attack prevention
                  mechanism focusing on system call privilege changes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {4},
  pages        = {461--473},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00514-7},
  doi          = {10.1007/S10207-020-00514-7},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/YamauchiAYNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ImamuraOUCLSY21,
  author       = {Yuta Imamura and
                  Rintaro Orito and
                  Hiroyuki Uekawa and
                  Kritsana Chaikaew and
                  Pattara Leelaprute and
                  Masaya Sato and
                  Toshihiro Yamauchi},
  title        = {Web access monitoring mechanism via Android WebView for threat analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {6},
  pages        = {833--847},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00534-3},
  doi          = {10.1007/S10207-020-00534-3},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ImamuraOUCLSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/OtaniOYMST21,
  author       = {Kohei Otani and
                  Toshiki Okazaki and
                  Toshihiro Yamauchi and
                  Hideaki Moriyama and
                  Masaya Sato and
                  Hideo Taniguchi},
  title        = {Function for Tracing Diffusion of Classified Information to Support
                  Multiple VMs with {KVM}},
  booktitle    = {Ninth International Symposium on Computing and Networking, {CANDAR}
                  2021 - Workshops, Matsue, Japan, 23-26 November 2021},
  pages        = {352--358},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CANDARW53999.2021.00066},
  doi          = {10.1109/CANDARW53999.2021.00066},
  timestamp    = {Fri, 18 Feb 2022 10:36:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/OtaniOYMST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuzunoY21,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {{KPRM:} Kernel Page Restriction Mechanism to Prevent Kernel Memory
                  Corruption},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {45--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_3},
  doi          = {10.1007/978-3-030-85987-9\_3},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuzunoY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakamuraIKY21,
  author       = {Toru Nakamura and
                  Hiroshi Ito and
                  Shinsaku Kiyomoto and
                  Toshihiro Yamauchi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {(Short Paper) Evidence Collection and Preservation System with Virtual
                  Machine Monitoring},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {64--73},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_4},
  doi          = {10.1007/978-3-030-85987-9\_4},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakamuraIKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/KusunokiYT21,
  author       = {Koki Kusunoki and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {Leonard Barolli and
                  Hsing{-}Chung Chen and
                  Tomoya Enokido},
  title        = {Physical Memory Management with Two Page Sizes in Tender {OS}},
  booktitle    = {Advances in Networked-Based Information Systems - The 24th International
                  Conference on Network-Based Information Systems (NBiS-2021), Taichung,
                  Taiwan, 1-3 September, 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {313},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84913-9\_22},
  doi          = {10.1007/978-3-030-84913-9\_22},
  timestamp    = {Thu, 12 Aug 2021 13:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/KusunokiYT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/KuzunoY20,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  title        = {Identification of Kernel Memory Corruption Using Kernel Memory Secret
                  Observation Mechanism},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {7},
  pages        = {1462--1475},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2019ICP0011},
  doi          = {10.1587/TRANSINF.2019ICP0011},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/KuzunoY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/IshiharaSY20,
  author       = {Takashi Ishihara and
                  Masaya Sato and
                  Toshihiro Yamauchi},
  title        = {Method of Generating a Blacklist for Mobile Devices by Searching Malicious
                  Websites},
  booktitle    = {Eighth International Symposium on Computing and Networking Workshops,
                  {CANDAR} 2020 Workshops, Naha, Japan, November 24-27, 2020},
  pages        = {328--333},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CANDARW51189.2020.00070},
  doi          = {10.1109/CANDARW51189.2020.00070},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic-nc/IshiharaSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuzunoY20,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {{MKM:} Multiple Kernel Memory for Protecting Page Table Switching
                  Mechanism Against Memory Corruption},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_6},
  doi          = {10.1007/978-3-030-58208-1\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuzunoY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/MoriyamaYST20,
  author       = {Hideaki Moriyama and
                  Toshihiro Yamauchi and
                  Masaya Sato and
                  Hideo Taniguchi},
  editor       = {Leonard Barolli and
                  Kin Fun Li and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Improvement and Evaluation of a Function for Tracing the Diffusion
                  of Classified Information on {KVM}},
  booktitle    = {Advances in Networked-Based Information Systems - The 23rd International
                  Conference on Network-Based Information Systems, NBiS 2020, Victoria,
                  BC, Canada, 31 August - 2 September 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1264},
  pages        = {338--349},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57811-4\_32},
  doi          = {10.1007/978-3-030-57811-4\_32},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/MoriyamaYST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IchiokaPMNY20,
  author       = {Shuichi Ichioka and
                  Estelle Pouget and
                  Takao Mimura and
                  Jun Nakajima and
                  Toshihiro Yamauchi},
  editor       = {Ilsun You},
  title        = {Accessibility Service Utilization Rates in Android Applications Shared
                  on Twitter},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {101--111},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_8},
  doi          = {10.1007/978-3-030-65299-9\_8},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/IchiokaPMNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijssc/SatoTY19,
  author       = {Masaya Sato and
                  Hideo Taniguchi and
                  Toshihiro Yamauchi},
  title        = {Design and implementation of hiding method for file manipulation of
                  essential services by system call proxy using virtual machine monitor},
  journal      = {Int. J. Space Based Situated Comput.},
  volume       = {9},
  number       = {1},
  pages        = {1--10},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSSC.2019.100007},
  doi          = {10.1504/IJSSC.2019.100007},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijssc/SatoTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/ImamuraOCMLSY19,
  author       = {Yuta Imamura and
                  Rintaro Orito and
                  Kritsana Chaikaew and
                  C{\'{e}}lia Manardo and
                  Pattara Leelaprute and
                  Masaya Sato and
                  Toshihiro Yamauchi},
  title        = {Threat Analysis of Fake Virus Alerts Using WebView Monitor},
  booktitle    = {2019 Seventh International Symposium on Computing and Networking,
                  {CANDAR} 2019, Nagasaki, Japan, November 25-28, 2019},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CANDAR.2019.00012},
  doi          = {10.1109/CANDAR.2019.00012},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic-nc/ImamuraOCMLSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KuzunoY19,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Swee{-}Huay Heng and
                  Javier L{\'{o}}pez},
  title        = {{KMO:} Kernel Memory Observer to Identify Memory Corruption by Secret
                  Inspection Mechanism},
  booktitle    = {Information Security Practice and Experience - 15th International
                  Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28,
                  2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11879},
  pages        = {75--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34339-2\_5},
  doi          = {10.1007/978-3-030-34339-2\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KuzunoY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoIOY19,
  author       = {Masaya Sato and
                  Yuta Imamura and
                  Rintaro Orito and
                  Toshihiro Yamauchi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) Method for Preventing Suspicious Web Access in Android
                  WebView},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {241--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_14},
  doi          = {10.1007/978-3-030-26834-3\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoIOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KudoYA18,
  author       = {Naoki Kudo and
                  Toshihiro Yamauchi and
                  Thomas H. Austin},
  title        = {Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid
                  Applications},
  journal      = {J. Inf. Process.},
  volume       = {26},
  pages        = {396--405},
  year         = {2018},
  url          = {https://doi.org/10.2197/ipsjjip.26.396},
  doi          = {10.2197/IPSJJIP.26.396},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/KudoYA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/ImamuraUISY18,
  author       = {Yuta Imamura and
                  Hiroyuki Uekawa and
                  Yasuhiro Ishihara and
                  Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {David Abramson},
  title        = {Web access monitoring mechanism for Android webview},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2018, Brisbane, QLD, Australia, January 29 - February 02, 2018},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167918.3167942},
  doi          = {10.1145/3167918.3167942},
  timestamp    = {Tue, 20 Jun 2023 16:27:45 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/ImamuraUISY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/YamauchiAYNH18,
  author       = {Toshihiro Yamauchi and
                  Yohei Akao and
                  Ryota Yoshitani and
                  Yuichi Nakamura and
                  Masaki Hashimoto},
  title        = {Additional Kernel Observer to Prevent Privilege Escalation Attacks
                  by Focusing on System Call Privilege Changes},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625137},
  doi          = {10.1109/DESEC.2018.8625137},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/YamauchiAYNH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YamamotoNYNT18,
  author       = {Masao Yamamoto and
                  Kohta Nakashima and
                  Toshihiro Yamauchi and
                  Akira Nagoya and
                  Hideo Taniguchi},
  title        = {Acceleration of Analysis Processing on Decentralized Performance Profiling
                  System Using Virtual Machines},
  booktitle    = {Sixth International Symposium on Computing and Networking, {CANDAR}
                  Workshops 2018, Takayama, Japan, November 27-30, 2018},
  pages        = {152--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CANDARW.2018.00035},
  doi          = {10.1109/CANDARW.2018.00035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YamamotoNYNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/BanY18,
  author       = {Yuya Ban and
                  Toshihiro Yamauchi},
  title        = {Mitigating Use-after-Free Attack Using Library Considering Size and
                  Number of Freed Memory},
  booktitle    = {Sixth International Symposium on Computing and Networking, {CANDAR}
                  Workshops 2018, Takayama, Japan, November 27-30, 2018},
  pages        = {398--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CANDARW.2018.00080},
  doi          = {10.1109/CANDARW.2018.00080},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/BanY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/SatoTY18,
  author       = {Masaya Sato and
                  Hideo Taniguchi and
                  Toshihiro Yamauchi},
  editor       = {Leonard Barolli and
                  Natalia Kryvinska and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Hiding File Manipulation of Essential Services by System Call Proxy},
  booktitle    = {Advances in Network-Based Information Systems, The 21st International
                  Conference on Network-Based Information Systems, NBiS-2018, Bratislava,
                  Slovakia, 5-7 September 2018},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {22},
  pages        = {853--863},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98530-5\_76},
  doi          = {10.1007/978-3-319-98530-5\_76},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/SatoTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamauchiIB17,
  author       = {Toshihiro Yamauchi and
                  Yuta Ikegami and
                  Yuya Ban},
  title        = {Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {10},
  pages        = {2295--2306},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016INP0020},
  doi          = {10.1587/TRANSINF.2016INP0020},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamauchiIB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamauchiA17,
  author       = {Toshihiro Yamauchi and
                  Yohei Akao},
  title        = {Kernel Rootkits Detection Method by Monitoring Branches Using Hardware
                  Features},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {10},
  pages        = {2377--2381},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016INL0003},
  doi          = {10.1587/TRANSINF.2016INL0003},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamauchiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Yamauchi17,
  author       = {Toshihiro Yamauchi},
  title        = {Editor's Message to Special Issue of Computer Security Technologies
                  against Sophisticated Cyber Attacks},
  journal      = {J. Inf. Process.},
  volume       = {25},
  pages        = {852--853},
  year         = {2017},
  url          = {https://doi.org/10.2197/ipsjjip.25.852},
  doi          = {10.2197/IPSJJIP.25.852},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/Yamauchi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/KudoYA17,
  author       = {Naoki Kudo and
                  Toshihiro Yamauchi and
                  Thomas H. Austin},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu and
                  Chi{-}Yi Lin},
  title        = {Access Control for Plugins in Cordova-Based Hybrid Applications},
  booktitle    = {31st {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017},
  pages        = {1063--1069},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AINA.2017.61},
  doi          = {10.1109/AINA.2017.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/KudoYA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/MoriyamaYST17,
  author       = {Hideaki Moriyama and
                  Toshihiro Yamauchi and
                  Masaya Sato and
                  Hideo Taniguchi},
  title        = {Performance Improvement and Evaluation of Function for Tracing Diffusion
                  of Classified Information on {KVM}},
  booktitle    = {Fifth International Symposium on Computing and Networking, {CANDAR}
                  2017, Aomori, Japan, November 19-22, 2017},
  pages        = {463--468},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CANDAR.2017.91},
  doi          = {10.1109/CANDAR.2017.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/MoriyamaYST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yamauchi16,
  author       = {Toshihiro Yamauchi},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {4},
  pages        = {785--786},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015ICF0001},
  doi          = {10.1587/TRANSINF.2015ICF0001},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yamauchi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakamuraMIKY16,
  author       = {Yuichi Nakamura and
                  Akira Moriguchi and
                  Masanori Irie and
                  Taizo Kinoshita and
                  Toshihiro Yamauchi},
  title        = {Rule-Based Sensor Data Aggregation System for {M2M} Gateways},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {12},
  pages        = {2943--2955},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016PAP0020},
  doi          = {10.1587/TRANSINF.2016PAP0020},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakamuraMIKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/FujiiSYT16,
  author       = {Shota Fujii and
                  Masaya Sato and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Design of Function for Tracing Diffusion of Classified Information
                  for {IPC} on {KVM}},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {5},
  pages        = {781--792},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.781},
  doi          = {10.2197/IPSJJIP.24.781},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/FujiiSYT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/FujiiSYT16,
  author       = {Shota Fujii and
                  Masaya Sato and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Evaluation and design of function for tracing diffusion of classified
                  information for file operations with {KVM}},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {5},
  pages        = {1841--1861},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-016-1671-5},
  doi          = {10.1007/S11227-016-1671-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/FujiiSYT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/SatoYT16,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Memory Access Monitoring and Disguising of Process Information to
                  Avoid Attacks to Essential Services},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {635--641},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0114},
  doi          = {10.1109/CANDAR.2016.0114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/SatoYT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YamauchiI16,
  author       = {Toshihiro Yamauchi and
                  Yuta Ikegami},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {HeapRevolver: Delaying and Randomizing Timing of Release of Freed
                  Memory Area to Prevent Use-After-Free Attacks},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_15},
  doi          = {10.1007/978-3-319-46298-1\_15},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/YamauchiI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/YamauchiYNMIIGT16,
  author       = {Toshihiro Yamauchi and
                  Yuta Yamamoto and
                  Kengo Nagai and
                  Tsukasa Matono and
                  Shinji Inamoto and
                  Masaya Ichikawa and
                  Masataka Goto and
                  Hideo Taniguchi},
  editor       = {Sascha Ossowski},
  title        = {Plate: persistent memory management for nonvolatile main memory},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {1885--1892},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851744},
  doi          = {10.1145/2851613.2851744},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/YamauchiYNMIIGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YuY15,
  author       = {Jing Yu and
                  Toshihiro Yamauchi},
  title        = {Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities
                  of WebView in Android {OS}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {98-D},
  number       = {4},
  pages        = {807--811},
  year         = {2015},
  url          = {https://doi.org/10.1587/transinf.2014ICL0001},
  doi          = {10.1587/TRANSINF.2014ICL0001},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YuY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamauchiTT15,
  author       = {Toshihiro Yamauchi and
                  Masahiro Tsuruya and
                  Hideo Taniguchi},
  title        = {Fast Control Method of Software-Managed {TLB} for Reducing Zero-Copy
                  Communication Overhead},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {98-D},
  number       = {12},
  pages        = {2187--2191},
  year         = {2015},
  url          = {https://doi.org/10.1587/transinf.2015PAL0003},
  doi          = {10.1587/TRANSINF.2015PAL0003},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamauchiTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NakamuraSY15,
  author       = {Yuichi Nakamura and
                  Yoshiki Sameshima and
                  Toshihiro Yamauchi},
  title        = {Reducing Resource Consumption of SELinux for Embedded Systems with
                  Contributions to Open-Source Ecosystems},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {5},
  pages        = {664--672},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.664},
  doi          = {10.2197/IPSJJIP.23.664},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/NakamuraSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/SatoYT15,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  title        = {Process Hiding by Virtual Machine Monitor for Attack Avoidance},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {5},
  pages        = {673--682},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.673},
  doi          = {10.2197/IPSJJIP.23.673},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/SatoYT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmu/NakamuraMY15,
  author       = {Yuichi Nakamura and
                  Akira Moriguchi and
                  Toshihiro Yamauchi},
  title        = {{CSDA:} Rule-based complex sensor data aggregation system for {M2M}
                  gateway},
  booktitle    = {Eighth International Conference on Mobile Computing and Ubiquitous
                  Networking, {ICMU} 2015, Hakodate, Japan, January 20-22, 2015},
  pages        = {108--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICMU.2015.7061051},
  doi          = {10.1109/ICMU.2015.7061051},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmu/NakamuraMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/IkegamiY15,
  author       = {Yuta Ikegami and
                  Toshihiro Yamauchi},
  title        = {Attacker Investigation System Triggered by Information Leakage},
  booktitle    = {{IIAI} 4th International Congress on Advanced Applied Informatics,
                  {IIAI-AAI} 2015, Okayama, Japan, July 12-16, 2015},
  pages        = {24--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IIAI-AAI.2015.247},
  doi          = {10.1109/IIAI-AAI.2015.247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/IkegamiY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/AkaoY15,
  author       = {Yohei Akao and
                  Toshihiro Yamauchi},
  title        = {Proposal of Kernel Rootkits Detection Method by Monitoring Branches
                  Using Hardware Features},
  booktitle    = {{IIAI} 4th International Congress on Advanced Applied Informatics,
                  {IIAI-AAI} 2015, Okayama, Japan, July 12-16, 2015},
  pages        = {721--722},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IIAI-AAI.2015.243},
  doi          = {10.1109/IIAI-AAI.2015.243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/AkaoY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/SatoY14,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  title        = {Secure and Fast Log Transfer Mechanism for Virtual Machine},
  journal      = {J. Inf. Process.},
  volume       = {22},
  number       = {4},
  pages        = {597--608},
  year         = {2014},
  url          = {https://doi.org/10.2197/ipsjjip.22.597},
  doi          = {10.2197/IPSJJIP.22.597},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/SatoY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SakamotoONY14,
  author       = {Shunya Sakamoto and
                  Kenji Okuda and
                  Ryo Nakatsuka and
                  Toshihiro Yamauchi},
  title        = {DroidTrack: Tracking and Visualizing Information Diffusion for Preventing
                  Information Leakage on Android},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {55--69},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.05.31.055},
  doi          = {10.22667/JISIS.2014.05.31.055},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SakamotoONY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YoshizakiY14,
  author       = {Kota Yoshizaki and
                  Toshihiro Yamauchi},
  title        = {Malware Detection Method Focusing on Anti-debugging Functions},
  booktitle    = {Second International Symposium on Computing and Networking, {CANDAR}
                  2014, Shizuoka, Japan, December 10-12, 2014},
  pages        = {563--566},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CANDAR.2014.36},
  doi          = {10.1109/CANDAR.2014.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YoshizakiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoY14,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Complicating Process Identification by Replacing Process Information
                  for Attack Avoidance},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_3},
  doi          = {10.1007/978-3-319-09843-2\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YamauchiHT13,
  author       = {Toshihiro Yamauchi and
                  Takayuki Hara and
                  Hideo Taniguchi},
  title        = {A mechanism for achieving a bound on execution performance of process
                  group to limit {CPU} abuse},
  journal      = {J. Supercomput.},
  volume       = {65},
  number       = {1},
  pages        = {38--60},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-011-0707-0},
  doi          = {10.1007/S11227-011-0707-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YamauchiHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/YuY13,
  author       = {Jing Yu and
                  Toshihiro Yamauchi},
  title        = {Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView
                  in Android {OS}},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications {\&} 2013 {IEEE} International Conference on
                  Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China,
                  November 13-15, 2013},
  pages        = {1628--1633},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPCC.and.EUC.2013.229},
  doi          = {10.1109/HPCC.AND.EUC.2013.229},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/YuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoY13,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Secure Log Transfer by Replacing a Library in a Virtual Machine},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_1},
  doi          = {10.1007/978-3-642-41383-4\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/OtsuboUYT13,
  author       = {Nobuto Otsubo and
                  Shinichiro Uemura and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {James J. Park and
                  Joseph Kee{-}Yin Ng and
                  Hwa{-}Young Jeong and
                  Agustinus Borgy Waluyo},
  title        = {Design and Evaluation of a Diffusion Tracing Function for Classified
                  Information Among Multiple Computers},
  booktitle    = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013,
                  Seoul, Korea},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {240},
  pages        = {235--242},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-94-007-6738-6\_30},
  doi          = {10.1007/978-94-007-6738-6\_30},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mue/OtsuboUYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/SakamotoONY13,
  author       = {Syunya Sakamoto and
                  Kenji Okuda and
                  Ryo Nakatsuka and
                  Toshihiro Yamauchi},
  editor       = {James J. Park and
                  Joseph Kee{-}Yin Ng and
                  Hwa{-}Young Jeong and
                  Agustinus Borgy Waluyo},
  title        = {DroidTrack: Tracking Information Diffusion and Preventing Information
                  Leakage on Android},
  booktitle    = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013,
                  Seoul, Korea},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {240},
  pages        = {243--251},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-94-007-6738-6\_31},
  doi          = {10.1007/978-94-007-6738-6\_31},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mue/SakamotoONY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/SakodaYT13,
  author       = {Takeshi Sakoda and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  James J. Park},
  title        = {Evaluation of Load Balancing in Multicore Processor for AnT},
  booktitle    = {16th International Conference on Network-Based Information Systems,
                  NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013},
  pages        = {360--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/NBiS.2013.57},
  doi          = {10.1109/NBIS.2013.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/SakodaYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/FurukawaYT12,
  author       = {Yuuki Furukawa and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {Leonard Barolli and
                  David Taniar and
                  Tomoya Enokido and
                  J. Wenny Rahayu and
                  Makoto Takizawa},
  title        = {Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling},
  booktitle    = {15th International Conference on Network-Based Information Systems,
                  NBiS 2012, Melbourne, Australia, September 26-28, 2012},
  pages        = {459--464},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/NBiS.2012.79},
  doi          = {10.1109/NBIS.2012.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/FurukawaYT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2012,
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5},
  doi          = {10.1007/978-3-642-34117-5},
  isbn         = {978-3-642-34116-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SatoY11,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {A Min Tjoa and
                  Gerald Quirchmayr and
                  Ilsun You and
                  Lida Xu},
  title        = {{VMBLS:} Virtual Machine Based Logging Scheme for Prevention of Tampering
                  and Loss},
  booktitle    = {Availability, Reliability and Security for Business, Enterprise and
                  Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross
                  Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August
                  22-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6908},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23300-5\_14},
  doi          = {10.1007/978-3-642-23300-5\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SatoY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/MoriyamaYT11,
  author       = {Hideaki Moriyama and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {Hyung Rim Choi and
                  Soongoo Hong and
                  Franz I. S. Ko},
  title        = {Control method of multiple services for {CMP} based on continuation
                  model},
  booktitle    = {Proceedings of the 4th International Conference on Interaction Sciences:
                  Information Technology, Culture and Human {(ICIS} 2011), Busan, Korea,
                  August 16-18, 2011},
  pages        = {83--89},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6014537},
  timestamp    = {Tue, 02 Mar 2021 08:49:01 +0100},
  biburl       = {https://dblp.org/rec/conf/interaction/MoriyamaYT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NakamuraSY10,
  author       = {Yuichi Nakamura and
                  Yoshiki Sameshima and
                  Toshihiro Yamauchi},
  title        = {SELinux Security Policy Configuration System with Higher Level Language},
  journal      = {J. Inf. Process.},
  volume       = {18},
  pages        = {201--212},
  year         = {2010},
  url          = {https://doi.org/10.2197/ipsjjip.18.201},
  doi          = {10.2197/IPSJJIP.18.201},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/NakamuraSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnit/YamauchiFT10,
  author       = {Toshihiro Yamauchi and
                  Kazuhiro Fukutomi and
                  Hideo Taniguchi},
  title        = {{ISIPC:} Instant Synchronous Interprocess Communication},
  journal      = {J. Next Gener. Inf. Technol.},
  volume       = {1},
  number       = {3},
  pages        = {75--83},
  year         = {2010},
  url          = {http://www.humanpub.org/jnit/ppl/JNIT0103\_09.pdf},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnit/YamauchiFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YamamotoY10,
  author       = {Kenji Yamamoto and
                  Toshihiro Yamauchi},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Evaluation of Performance of Secure {OS} Using Performance Evaluation
                  Mechanism of LSM-Based {LSMPMON}},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {57--67},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_7},
  doi          = {10.1007/978-3-642-17610-4\_7},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/YamamotoY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YamauchiHT10,
  author       = {Toshihiro Yamauchi and
                  Takayuki Hara and
                  Hideo Taniguchi},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {A Mechanism That Bounds Execution Performance for Process Group for
                  Mitigating {CPU} Abuse},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {84--93},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_10},
  doi          = {10.1007/978-3-642-17610-4\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/YamauchiHT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/FurukawaYT10,
  author       = {Yuuki Furukawa and
                  Toshihiro Yamauchi and
                  Hideo Taniguchi},
  editor       = {Tai{-}Hoon Kim and
                  Young{-}Hoon Lee and
                  Byeong Ho Kang and
                  Dominik Slezak},
  title        = {Proposal for Sophisticated Periodic Execution Control in Embedded
                  Systems},
  booktitle    = {Future Generation Information Technology - Second International Conference,
                  {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6485},
  pages        = {549--563},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17569-5\_54},
  doi          = {10.1007/978-3-642-17569-5\_54},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/FurukawaYT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics